Free Delivery Over $100
10034 books were found.
Read More >>
A reference and resource for practitioners and professionals who manage, administer, and design Internet security... Read More >>
Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. This... Read More >>
Provides a practical approach for establishing, managing and operating a comprehensive Information Assurance program.... Read More >>
This book is a test prep book to help you pass the test. It discusses successful approaches for the exam, provides... Read More >>
Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect... Read More >>
This volume demonstrates how to incorporate security within the underlying network infrastructure, and discusses... Read More >>
Offers information covering many of Cisco's security products that provide protection from threats, detection of... Read More >>
Presents details on major mobile/wireless clients and operating systems. This guide to wireless security helps you... Read More >>
Demonstrates techniques for strengthening network security. The book provides an introduction to Cisco technology... Read More >>
A comprehensible guide to network security. It explains the developments in this field that has become so critical... Read More >>
Mobile Computation with Functions explores distributed computation with languages which adopt functions as the main... Read More >>
Most computer users are ignorant of the tracks, trails, and traces they leave behind when they use their computer.... Read More >>
"Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications... Read More >>
Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN,... Read More >>
A framework for network security which may be used by the military, government, industry, and academia network personnel.... Read More >>
This book shows security engineers how to configure, deploy, and troubleshoot the preferred tools of the trade.... Read More >>
A guide to protecting your Windows 2000 Network. It covers methods of attack and hacker secrets. It is suitable... Read More >>
Combines two topics - security and Cisco - on installing, configuring, operating and managing the popular and effective... Read More >>
This hands-on guide enables professionals to implement public key infrastructure (PKI) technology, using scenario-based... Read More >>
This volume explains how to implement XML security. The book brings the reader up to speed fast with both an XML... Read More >>
Many organizations have begun to have a more focused approach to disaster planning Read More >>